1.
______ controls the way in which the computer
system functions and provides a means by which users can interact with the
computer.
a. The platform
b. Application software
c. Operating
system
d. The motherboard
2.
Servers are computers
that provide resources to other computers connected to:
a. Mainframe
b. Network
c. super computer
3.
A device that operates
under the control of another device is called?
a. Stem
b. Slave
c. Simulator
d. Emulator
4.
URL stands for?
a. Universal Research List
b. Universal Resource List
c. Uniform
Resource Locator
d. Uniform Research Locator
5.
A database management
system (DBMS) is a?
a. hardware system used to create, maintain and
provide controlled access to a data- base
b. hardware system used to create, maintain, and
provide uncontrolled access to a database.
c. software system used to create, maintain, and
provide uncontrolled access to a database.
d. software
system used to create, maintain and provide controlled access to a database.
6.
The design of the
network is called the network?
a. Architecture
b. Server
c. Transmission
d. Type
7.
A Proxy server is used
for which of the following?
a. To provide security against unauthorized users
b. To
process client requests for web pages
c. o provide TCP/IP
d. To process client requests for database access
8.
When data changes in
multiple lists and all lists are not updated, this causes?
a. data redundancy
b. information overload
c. duplicate data
d. data inconsistency
9.
_____ are words that a
programming language has set aside for its own use?
a. Control words
b. Reserved
words
c. Control structures
d. Reserved keys
10.
The most frequently used
instructions of a computer program are likely to be fetched from?
a. the hard disk
b. cache
memory
c. RAM
d. Registers
11.
What is the shortcut key
to "Undo" the last action in a document?
a. Ctrl + X
b. Ctrl + Y
c. Ctrl
+ Z
d. Ctrl + U
12.
You must install a(n)
________ on a network if you want to share a broadband Internet connection.
a. Router
b. Modem
c. Node
d. Cable
13.
The errors that can be
pointed out by the compiler are?
a. Syntax
errors
b. Semantic errors
c. Logic errors
d. System errors
14.
Granting an outside
organization access to internet web pages is often implemented using a(n)?
a. Extranet
b. Intranet
c. Internet
d. Hacker
15.
Which term identifies a
specific computer on the web and the main page of the entire site?
a. URL
b. Web site address
c. Hyperlink
d. Domain name
16.
The code that relational
database management systems use to perform their database task is referred to
as?
a. QBE
b. SQL
c. OLAP
d. Sequel Server
17.
Chip is a common
nickname for a(n)?
a. Transistor
b. Resistor
c. integrated
circuit
d. semiconductor
18.
Programs such as
Internet Explorer that serve as navigable windows into the Web are called
a. Hypertext
b. Networks
c. Internet
d. Web
browsers
19.
What menu is selected to
cut, copy and paste?
a. File
b. Tools
c. Special
d. Edit
20.
The most important or
powerful computer in a typical network is?
a. Desktop
b. network client
c. network
server
d. network station
No comments:
Post a Comment